CVE-2025-27025

HIGH

Infinera G42 6.1.3 through 7.1 - Directory Traversal

Title source: llm
STIX 2.1

Description

The target device exposes a service on a specific TCP port with a configured endpoint. The access to that endpoint is granted using a Basic Authentication method. The endpoint accepts also the PUT method and it is possible to write files on the target device file system. Files are written as root. Using Postman it is possible to perform a Directory Traversal attack and write files into any location of the device file system. Similarly to the PUT method, it is possible to leverage the same mechanism to read any file from the file system by using the GET method.

Scores

CVSS v3 8.8
EPSS 0.0073
EPSS Percentile 72.8%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

CISA SSVC

Vulnrichment
Exploitation none
Automatable no
Technical Impact total

Details

CWE
CWE-280
Status published
Products (1)
Infinera/G42 6.1.3 - 7.1
Published Jul 02, 2025
Tracked Since Feb 18, 2026